{"_id":"rKsr7hei9L5T8henF","bibbaseid":"bolunwang-yuanshunyao-shawnshan-huiyingli-bimalviswanath-haitaozhen-benyzhao-stealthypornunderstandingrealworldadversarialimagesforillicitonlinepromotion-2019","author_short":["Bolun Wang","Yuanshun Yao","Shawn Shan","Huiying Li","Bimal Viswanath","Haitao Zhen","Ben Y. Zhao"],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","address":"Los Alamitos, CA, USA","title":"Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion","volume":"1","url":"https://doi.ieeecomputersociety.org/10.1109/SP.2019.00032","doi":"10.1109/SP.2019.00032","booktitle":"IEEE Symposium on Security and Privacy - SP '19","publisher":"IEEE Computer Society","author":[{"firstnames":[],"propositions":[],"lastnames":["Bolun Wang"],"suffixes":[]},{"firstnames":[],"propositions":[],"lastnames":["Yuanshun Yao"],"suffixes":[]},{"firstnames":[],"propositions":[],"lastnames":["Shawn Shan"],"suffixes":[]},{"firstnames":[],"propositions":[],"lastnames":["Huiying Li"],"suffixes":[]},{"firstnames":[],"propositions":[],"lastnames":["Bimal Viswanath"],"suffixes":[]},{"firstnames":[],"propositions":[],"lastnames":["Haitao Zhen"],"suffixes":[]},{"firstnames":[],"propositions":[],"lastnames":["Ben Y. Zhao"],"suffixes":[]}],"month":"May","year":"2019","keywords":"adversarial-images, cybercrime, deep-learning","pages":"547–561","bibtex":"@inproceedings{bolun_wang_stealthy_2019,\n\taddress = {Los Alamitos, CA, USA},\n\ttitle = {Stealthy {Porn}: {Understanding} {Real}-{World} {Adversarial} {Images} for {Illicit} {Online} {Promotion}},\n\tvolume = {1},\n\turl = {https://doi.ieeecomputersociety.org/10.1109/SP.2019.00032},\n\tdoi = {10.1109/SP.2019.00032},\n\tbooktitle = {{IEEE} {Symposium} on {Security} and {Privacy} - {SP} '19},\n\tpublisher = {IEEE Computer Society},\n\tauthor = {{Bolun Wang} and {Yuanshun Yao} and {Shawn Shan} and {Huiying Li} and {Bimal Viswanath} and {Haitao Zhen} and {Ben Y. Zhao}},\n\tmonth = may,\n\tyear = {2019},\n\tkeywords = {adversarial-images, cybercrime, deep-learning},\n\tpages = {547--561},\n}\n\n","author_short":["Bolun Wang","Yuanshun Yao","Shawn Shan","Huiying Li","Bimal Viswanath","Haitao Zhen","Ben Y. Zhao"],"key":"bolun_wang_stealthy_2019","id":"bolun_wang_stealthy_2019","bibbaseid":"bolunwang-yuanshunyao-shawnshan-huiyingli-bimalviswanath-haitaozhen-benyzhao-stealthypornunderstandingrealworldadversarialimagesforillicitonlinepromotion-2019","role":"author","urls":{"Paper":"https://doi.ieeecomputersociety.org/10.1109/SP.2019.00032"},"keyword":["adversarial-images","cybercrime","deep-learning"],"metadata":{"authorlinks":{}},"downloads":0,"html":""},"bibtype":"inproceedings","biburl":"https://bibbase.org/zotero/bxt101","dataSources":["Wsv2bQ4jPuc7qme8R"],"keywords":["adversarial-images","cybercrime","deep-learning"],"search_terms":["stealthy","porn","understanding","real","world","adversarial","images","illicit","online","promotion","bolun wang","yuanshun yao","shawn shan","huiying li","bimal viswanath","haitao zhen","ben y. zhao"],"title":"Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion","year":2019}